Several widely-deployed messaging applications have developed their own protocols. While these protocols are similar, no two are close enough to interoperate. As a result, each application vendor has had to maintain their own protocol stack and independently build trust in the quality of the protocol. The goal of the
working group is to develop a standard messaging security protocol for human-to-human(s) communication with the above security and deployment properties so that applications can share code, and so that there can be shared validation of the protocol (as there has been with TLS 1.3).
TLS 1.3, the latest version of the Transport Layer Security protocol, brings forth significant advancements and improvements over its predecessors. In this discussion, we will delve into some of the key changes introduced by TLS 1.3, namely the increased encryption in the handshake process, deprecation of specific key exchange algorithms, and the introduction of new extensions. Additionally, we will explore the implications of TLS 1.3 on network management within enterprises.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which IBM and other software companies later marketed. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
In this one-hour webinar, we will delve into the world of Transport Layer Security (TLS) and focus on one of its fundamental components, the handshake. TLS is a cryptographic protocol widely used to secure communication over computer networks. By analyzing packet traces, we will demystify the TLS handshake process, step by step, and gain a comprehensive understanding of how it establishes secure connections.
- The importance of TLS and secure communication
- Overview of the TLS protocol
- Explanation of its role in securing network communications
- Discussion on the importance of the handshake process
- A step-by-step breakdown of the TLS handshake process
- Highlighting key TLS handshake message types and their significance
Nalini Elkins is the President of the Industry Network Technology Council. She is also the CEO and Founder of Inside Products, Inc. Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
This webinar is a part of the Cryptography webinar series.
The goal for the second security session is to understand some of the terms which are crucial to cryptography. The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:
-
DES
-
3DES
-
Asymmetric encryption / symmetric encryption
-
Elliptic curve cryptography
-
Certificate authorities
-
Diffie-Hellman key exchange
-
Diffie-Hellman groups
-
Hashed message authentication code (HMAC)
-
Message authentication code (MAC)
-
Message digest algorithm 5 (MD5)
-
Rivest Shamir Adleman (RSA)
-
Secure hash algorithm (SHA)
-
X.500 distinguished name
-
X.509 digital certificates
Nalini Elkins is the President of the Industry Network Technology Council. She is also the CEO and Founder of Inside Products, Inc. Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
The goal for the first security session is to understand some of the terms which are crucial to cryptography. The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:
-
DES
-
3DES
-
Asymmetric encryption / symmetric encryption
-
Elliptic curve cryptography
-
Certificate authorities
-
Diffie-Hellman key exchange
-
Diffie-Hellman groups
-
Hashed message authentication code (HMAC)
-
Message authentication code (MAC)
-
Message digest algorithm 5 (MD5)
-
Rivest Shamir Adleman (RSA)
-
Secure hash algorithm (SHA)
-
X.500 distinguished name
-
X.509 digital certificates
Nalini Elkins is the President of the Industry Network Technology Council. She is also the CEO and Founder of Inside Products, Inc. Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
From: Thursday, 23rd February 2023 to Thursday, 12th October 2023
Session Topics for Security webinars:
- Fundamentals of Cryptography: February 23, 11am Eastern, 9:30pm India
- Fundamentals of Cryptography: April 20, 11am Eastern, 8:30pm India
- Fundamentals of Cryptography: May 18, 11am Eastern, 8:30pm India
- How does TLS work? (up to 1.3): June 15, 11am Eastern, 8:30pm India
- How does TLS1.3 work?: August 10, 11am Eastern, 8:30pm India
- Introduction to MLS: September 14, 11am Eastern, 8:30pm India
- MLS in Depth: October 12, 11am Eastern, 8:30pm India

Connections is being held April 2-8, 2022, shortly after the IETF 113 meeting. It is a fully online event created jointly by IIESoc & INTC. The first day will include the following keynote presentations:
- IPv6 — past, present & future by Bob Hinden
- Going Dark — catastrophic security and privacy losses due to loss of visibility by managed private network operators by Dr. Paul Vixie
- TBD by Ron Bonica
This session discusses the ways enterprises might want to think about migration to IPv6. Some vulnerabilities may be the same as IPv4 while other will be different. Vulnerabilities may be introduced by additional complexity, for example, transition mechanisms or dual-stacking.When many enterprises think about security, a number of areas are involved. These include:
- Audits/Compliance
- Threat detection
- Risk analysis
- Root cause determination
- Encryption
- Privacy
- Confidentiality
- Penetration testing
Presented by Nalini Elkins.
Unwanted and illegal robocalls continue to be both one of the largest communications-related nuisances (particularly since many of us are home to get them all day…) and are commonly used to defraud victims using social security, warranty and other scams. Fighting these unwanted calls has proven to be hard and is likely to require a combination of approaches that may also hasten the end of the traditional circuit-switched public switched telephone network. I’ll describe why unwanted robocalls are probably harder to curtail than spam emails and what techniques may help. I’ll focus particularly on calling number authentication, standardized by the IETF and ATIS in the STIR and SHAKEN working groups. STIR/SHAKEN offer a good case study that protocol standards are necessary, but need to be augmented by additional organizational infrastructure and operational practices to be successful. However, calling number authentication combined with simple call filters may only offer a temporary respite from unwanted calls unless other holes in the call delivery chain are plugged that allow shady operators to place millions of calls.
Prof. Henning Schulzrinne, Levi Professor of Computer Science at Columbia University, received his Ph.D. from the University of Massachusetts in Amherst, Massachusetts. MTS at AT&T Bell Laboratories; associate department head at GMD-Fokus (Berlin), before joining the Computer Science and EE departments at Columbia University. He served as chair of Computer Science from 2004 to 2009 and as Engineering Fellow, Technical Advisor and Chief Technology Officer of the Federal Communications Commission (FCC) from 2010 until 2017.
Protocol standards co-developed by him, including RTP, RTSP and SIP, are now used by almost all Internet telephony and multimedia applications. Fellow of the ACM and IEEE.